Skip to content

Instantly share code, notes, and snippets.

@jimmy-ly00
jimmy-ly00 / breach.txt
Created May 20, 2024 21:31 — forked from fawazahmed0/breach.txt
Email and password breach collection list
# Please Note, I am sharing this, hoping this will be used for good public use, such as data analysis, penetration testing etc
# These links are already available all over the internet
# Also Note, Trying to login into someone else's account without their permission is unethical and illegal
# Collection 1
magnet:?xt=urn:btih:B39C603C7E18DB8262067C5926E7D5EA5D20E12E&dn=Collection%201&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=http%3a%2f%2fopentracker.xyz%3a80%2fannounce
# Collection 2-5 & Antipublic
magnet:?xt=urn:btih:D136B1ADDE531F38311FBF43FB96FC26DF1A34CD&dn=Collection%20%232-%235%20%26%20Antipublic&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=http%3a%2f%2fopentracker.xyz%3a80%2fannounce
@daggerhart
daggerhart / .htaccess
Last active November 7, 2025 23:23
WordPress Rewrite API Examples
<IfModule mod_rewrite.c>
# enable rewriting
RewriteEngine on
# don't rewrite files that exist in the file system
RewriteCond %{REQUEST_FILENAME} !-f
# don't rewrite directories that exist in the file system
RewriteCond %{REQUEST_FILENAME} !-d
@nucliweb
nucliweb / How-Browsers-Work.md
Last active November 7, 2025 23:23
How Browsers Work
2eb2ffcb-56f8-4d93-8dd4-a64e0a2c44cc_1600x742

Image by Susie Lu, take from the Addy Osmani's post


I believe it’s very important to understand how the software that users are working with actually functions. From a purely technical point of view, for the development team the clients are the browsers, and understanding how they read, interpret, and render our code is essential to provide the best possible experience for the users of the application or website.

Webhooks vs Polling

What are webhooks, and why should you be using them? A webhook is a way to deliver real-time data to applications. Unlike traditional APIs where you need to poll for data frequently in order to get quasi real-time information, webhooks send data immediately.

You can think about webhooks like push notifications on your mobile phone. Rather than burning up the battery on your phone fetching information (polling) from applications to get updates, push notifications (webhooks) automatically send data based on event triggers. And just like push notifications, webhooks are less resource-intensive.

How Do Webhooks Work?

A webhook is an HTTP request (typically a POST sent to a pre-defined callback URI, where the server application is configured to handle the request on that URI. In many cases, webhooks are triggered by stimulus events, making them a faster and more efficient met

@roger-
roger- / alpine-setup.sh
Last active November 7, 2025 23:16
Alpine Linux: setup user and docker for Proxmox
#!/bin/sh
USERNAME="EDIT_THIS"
PASSWORD="EDIT_THIS"
# add community repo
sed '/community/ {s/^#//; q;}' /etc/apk/repositories > tempfile && mv tempfile /etc/apk/repositories
apk update
# install sudo (alternative to doas)

GitHub Search Syntax for Finding API Keys/Secrets/Tokens

As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.

Search Syntax:

(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))

Examples:

**1.

@robskillington
robskillington / prometheus.proto
Last active November 7, 2025 23:14
Example Python Prometheus remote write client
// Copyright 2016 Prometheus Team
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
@kangarko
kangarko / README.md
Last active November 7, 2025 23:13
15-Minute Minecraft Plugin Tutorial For 1.8.8 - 1.21

15-Minute Minecraft Plugin Tutorial For 1.8.8 - 1.21

In this new Minecraft plugin development guide, I'll show you how to make Minecraft plugins for Bukkit, Spigot and Paper.

This guide covers Minecraft plugins for 1.8.8 to 1.21.

We'll be using IntelliJ with a dedicated extension for Minecraft plugin development to make this process fast and easy.

Do you want a complete step-by-step tutorial on developing your own Minecraft plugins? Click here for a full Minecraft plugin development training.

@mohanpedala
mohanpedala / bash_strict_mode.md
Last active November 7, 2025 23:12
set -e, -u, -o, -x pipefail explanation
@reedho
reedho / deps.edn
Last active November 7, 2025 23:11
Datalevin range-seq with Missionary
{:paths ["src" "resources"]
:deps {org.clojure/clojure {:mvn/version "1.12.0-alpha5"}
missionary/missionary {:mvn/version "b.33"}
datalevin/datalevin {:mvn/version "0.8.21"}
}
:aliases
{:run-m {:main-opts ["-m" "playground.playground"]}
:run-x {:ns-default playground.playground
:exec-fn greet